Skip to content

Commit afd4359

Browse files
committed
Update Blog “how-to-change-the-factory-generated-ilo-administrator-password”
1 parent 0836357 commit afd4359

File tree

3 files changed

+17
-13
lines changed

3 files changed

+17
-13
lines changed

content/blog/how-to-change-the-factory-generated-ilo-administrator-password.md

Lines changed: 17 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -17,15 +17,19 @@ Updated March 6, 2024
1717

1818
You receive a bunch of brand new rack-mount ProLiant servers and want to get them up and running as soon as possible. Ansible, Chef, Puppet, Ironic, Python, PowerShell are your friends but, before being able to use those powerful and flexible tools to fully deploy the servers, you need one little thing: An access to the iLO to configure low level system parameters (i.e. iLO network, BIOS, storage…).
1919

20-
This blog proposes a simple, quick and modern method to modify the factory randomly generated Administrator iLO password without knowing it. It can be used on one or several thousands of rack-mount ProLiant servers starting at Gen9 models. This problem does not exist for blades or Synergy compute modules because their embedded management modules (respectively OA and Composer) have the ability to perform those tasks without any credentials.
20+
This blog post proposes a simple, quick and modern method to modify the factory randomly generated Administrator iLO password without knowing it. It can be used on one or several thousands of rack-mount ProLiant servers starting at Gen9 models. This problem does not exist for blades or Synergy compute modules because their embedded management modules (respectively OA and Composer) have the ability to perform those tasks without any credentials.
2121

22-
## In-band management with `ilorest` does the trick
22+
## In-band management with HPE iLOrest does the trick
2323

24-
HPE rack-mount servers, unless they have been customized by the [HPE Factory Express integration service](https://www.hpe.com/us/en/services/factory-express.html) comes with a randomly generated factory password visible on a physical paper/plastic tag located somewhere on the front side of the servers. To speed-up the collection of the passwords it is possible to scan and export them in a .csv formatted file, using a smartphone bar-code application. However, this method has its limits when it comes to processing several hundreds or thousands of servers.
24+
HPE rack-mount servers, unless they have been customized by the <a href="https://www.hpe.com/us/en/services/factory-express.html" target="_blank">HPE Factory Express integration service</a> comes with a randomly generated factory password visible on a physical paper/plastic tag located somewhere on the front side of the servers. To speed-up the collection of the passwords it is possible to scan and export them in a `.csv` formatted file, using a smartphone bar-code application. However, this method has its limits when it comes to processing several hundreds or thousands of servers.
2525

26-
Instead, I will use an in-band management access method with the [ilorest(8)](http://www.hpe.com/info/resttool) tool. This [RESTful Interface tool](http://www.hpe.com/info/resttool) can talk to iLO 4/5 either from remote (out-of-band) or from the Operating System (Linux or Windows) running on the server itself (In-band management).
26+
Instead, I will use an in-band management access method with the <a href="https://github.com/HewlettPackard/python-redfish-utility/releases/latest" target="_blank">HPE iLOrest</a> tool. This RESTful Interface tool can talk to iLO 4/5/6 either from remote (out-of-band) or from the Operating System (Linux or Windows) running on the server itself (In-band management).
2727

28-
To set the iLO 4/5 Administrator password, when logged in to the OS as a privileged user (root or Administrator), I just need to create a text file (i.e. `MyPassword.txt`) with the following content:
28+
> **NOTE**: The method presented below works only if the security state is `Production`. In higher security states, it is required to supply credentials. Use the following command to retrieve the `SecurityState` property of a server:
29+
>
30+
> `ilorest get SecurityState --select HpeSecurityService. --url <ilo-ip> --user <ilo-user> --password password --logout`
31+
32+
To set the iLO Administrator password, when logged in to the OS as a privileged user (root or Administrator), I just need to create a text file (i.e. `MyPassword.txt`) with the following content:
2933

3034
```
3135
{
@@ -36,24 +40,24 @@ To set the iLO 4/5 Administrator password, when logged in to the OS as a privile
3640
}
3741
```
3842

39-
Then, using the `ilorest` tool, I connect to the iLO via an internal path (no credential required here) and send the password request modification:
43+
Then, using the HPE iLOrest tool, I connect to the iLO via the <a href="https://developer.hpe.com/blog/chif-driver-not-found/" target="_blank">Channel Interface</a> (CHIF). Again, when logged as a privileged user, when the iLO is in `Production` mode, you don't need to supply any credential, and you can send the password request modification:
4044

41-
![Changing the iLO factory generated Administrator password with ilorest](/img/1-change-password-with-ilorest.png "Changing the iLO factory generated Administrator password with ilorest")
45+
![Changing the iLO factory generated Administrator password with iLOrest](/img/1-change-password-with-ilorest.png "Changing the iLO factory generated Administrator password with iLOrest")
4246

43-
# Data model clean crawling
47+
## Data model clean crawling
4448

4549
But are you sure you changed the Administrator password and not another password account? What if the Administrator account is not located at position “1” in this collection of object?
4650

47-
`ilorest` can help you isolate the exact location of the Administrator account. The following command returns in JSON format what you need:
51+
HPE iLOrest can help you isolate the exact location of the Administrator account. The following command returns in JSON format what you need:
4852

49-
![List iLO user account 1 with ilorest](/img/2-ilorest-list-manager-account.png)
53+
![Retrieve URI of iLO user account 1 with iLOrest](/img/2-ilorest-list-manager-account.png "Retrieve URI of iLO user account 1 with iLOrest")
5054

5155
With a simple parsing of the output of this command, you can create an error prone script to change the desired password.
5256

53-
Should you need to perform more complex digging to retrieve objects from this data model, the [Managing HP Servers Using the HP RESTful API](http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=c04423967) manual explains very well with pseudo code examples how to crawl the data model without making bad assumptions.
57+
Should you need to perform more complex digging to retrieve objects from this data model, the <a href="https://servermanagementportal.ext.hpe.com/docs/redfishclients/ilorest-userguide/" target="_blank">HPE iLOrest user guide</a> contains a lot of useful examples.
5458

55-
# Building the complete solution
59+
## Building the complete solution
5660

57-
Using this in-band management feature you can easily foresee an entire solution starting with a PXE boot of the servers on a minimal WinPE or PE-Linux operating system containing the `ilorest(8)` tool and an automatic trigger of a script performing the iLO password change and other tasks if desired.
61+
Using this in-band management feature you can easily foresee an entire solution starting with a PXE boot of the servers on a minimal WinPE or PE-Linux operating system containing the iLOrest tool and an automatic trigger of a script performing the iLO password change and other tasks if desired.
5862

5963
Don't forget to check out some of my other <a href="https://developer.hpe.com/search/?term=donze" target="_blank">blog posts</a> on the HPE Developer portal to learn more about Redfish tips and tricks.
-1.92 KB
Loading
-6.74 KB
Loading

0 commit comments

Comments
 (0)